answer scheme mid year ict form 4 section a name ic no form question no candidate’s answer skor 1 b
ANSWER SCHEME
MID YEAR ICT FORM 4
SECTION A
NAME
IC NO
Form
Question No
Candidate’s Answer
Skor
1
B
1
2
B
2
3
True
3
4
i)
Hand Geometry Scanning
4
ii)
Facial Recognition
5
5
D
6
6
B
7
7
D
8
8
i)
B
9
ii)
D
10
iii)
C
11
9
True
12
10
D
13
11
i)
False
14
ii)
True
15
12
i)
220 or 1048576 (choose either one only)
16
ii)
Bit
17
13
i)
A
18
ii)
B
19
iii)
D
20
14
C
21
15
B
22
16
i)
D
23
ii)
C
24
iii)
A
25
17
C
26
18
False
27
19
Blue-ray disc
28
20
False
29
21
C
30
22
Managing data and programs
31
23
i)
K
32
ii)
L
33
iii)
N
34
24
A
35
25
B
36
TOTAL MARKS
QUES
NO
QUESTIONS
ANSWER
SCORES
26
a.
Based on statement above, list TWO controversial contents from the
impact of ICT on society.
Pornography
1 m
1 m
Slander
b.
State TWO impacts of one controversial contents in (a) to Malaysian
society.
Pornography
Can lead criminal acts
1 m
1 m
1 m
1 m
Can lead sexual addiction/Can lead sexual addiction/perversion
Can develop low moral value towards other man, women, children
Can erode good religious, cultural and social beliefs and behaviour
OR
Slander
Can develop into society that disregards honesty and truth.
Can develop bad habit of spreading untruths and rumours
Can lead to unnecessary argument
Can cause people to have negative attitudes towards another person
(choose either TWO impacts from Pornography OR TWO impact from
Slander. One answer carry ONE mark)
27
a.
Name and explain the type of computer crime that Shen has committed.
Copyright Infringement.
1 m
Involves illegal copy or reproduction of copyrights materials by the
black market group
1 m
b.
What was happened to Shen’s computer? How can Shen prevent his
computer from the problem?
Computer virus.
1 m
Install anti-virus software/ scan files for viruses before
downloading.
1 m
28
a.
Describe why does Mohan encrypt the report?
To secure the information
1 m
To make sure only the authorized person can read the information
1 m
b.
What is the term given to the encrypted text in the report?
Encryption key and decryption key
1 m
Cipher text
1 m
29
a.
What is R? Explain the function of R?
Output.
1 m
Output is data that has been processed into a useful form called
information
1 m
b.
R have four types. State TWO types of R.
Texts, graphics, audio, video
2 m
(choose any two answer)
30
a.
Name types of user interface for X and Y.
X- Command line
1 m
Y- Graphical User Interface
1 m
b.
State TWO differences between X and Y.
X
Y
User have to memories all the syntax to issues command
User have not to memories all the syntax to issue command
Difficult to use
Easy to use.
Not user friendly
User friendly.
(choose two differences ONLY and compare the answer in same aspect )
1 m
1 m
1 m
31
a.
Proposed ONE of the latest technology that can be use by Cikgu Rose to
conduct her lesson although she is attending the course.
Video conferencing or Voice Over Internet Protocol (VOIP) or any
related answer
1 m
ability to meet with people in remote locations without incurring
travel expenses or other expenses associated with face to face
communication
1 m
easily accessed and contacted using video conferencing
1 m
can stimulate better brainstorming, knowledge sharing and information
gathering
( or any related answers)
1 m
b.
Identify TWO input devices and ONE output device that you justify in
(a).
Input devices : Web cam, microphone
2 m
Output devices : Speaker, monitor
(choose either one for output devices)
1 m
32
a.
Name X, Y, and Z
X: Mobile users
1 m
Y: SOHO users
1 m
Z: Power users
1 m
b.
Explain how users in Y works.
i)
use desktop or notebook computers as well as telephone, hand phones
and PDAs in completing their tasks and communicating
1 m
ii)
work in a small company or work as an individual at home
1 m
iii)
They advertise their products and services through websites
1 m
iv)
SOHO also have their own basic business software such as word
processing and spreadsheet software to assist them in documents
preparation and their financial tasks.
1 m
33
a.
Explain the TWO function of ASCII and describe the ASCII working
process in the computer system.
Function of ASCII
ASCII was established to achieve compatibility between various types
of data processing equipment making it possible for the components to
communicate with each other successfully.
1 m
ASCII enables manufactures to produce components that are assured to
operate correctly in a computer.
1 m
ASCII working process:
Every character is converted to its corresponding binary form. The
computer processes the letter as a byte, which actually a series of on
and off of electrical states. When the computer is finished processing
the byte, the software installed in the system convert the byte back
which is then displayed in the screen.
2 m
b.
Explain the relationship of data representation for bit, byte and
character.
A bit is the smallest unit of data and represented by the number 1 and
0.
Byte is a unit of information built from bits. One byte equals to 8
bits.
One byte represents one character such as A,7,9 and +
1 m
1 m
1 m